Analysis
-
max time kernel
153s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01-05-2023 18:36
Static task
static1
Behavioral task
behavioral1
Sample
d3b3437d6ea7a02c992585b5cf2b2c34fb7c4b93b81e4407ae7d7d3ee5def890.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
d3b3437d6ea7a02c992585b5cf2b2c34fb7c4b93b81e4407ae7d7d3ee5def890.exe
Resource
win10v2004-20230220-en
General
-
Target
d3b3437d6ea7a02c992585b5cf2b2c34fb7c4b93b81e4407ae7d7d3ee5def890.exe
-
Size
690KB
-
MD5
c739646777bfd5d1ae7da944ad269ac3
-
SHA1
d98aca4ac920187c5332a85100ced78017feed0c
-
SHA256
d3b3437d6ea7a02c992585b5cf2b2c34fb7c4b93b81e4407ae7d7d3ee5def890
-
SHA512
f34e727e6126821eeb8c8d7ddbf65f0f7fa972718c24cbc2b6fd2e1134378c8ee5a438ef7c5650ca4db405a2dcee6cb20fde687719177b93fa41b10144a3acc7
-
SSDEEP
12288:Jy90NVXamCIhcVExQBlYGPDqbH7/mAbrLari36NaT3Hc8/oXHyy:Jy8VXcVEW74H7+Ab3ari360T3c85y
Malware Config
Signatures
-
Detects Redline Stealer samples 1 IoCs
This rule detects the presence of Redline Stealer samples based on their unique strings.
resource yara_rule behavioral2/memory/2164-992-0x0000000007610000-0x0000000007C28000-memory.dmp redline_stealer -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableRealtimeMonitoring = "1" 66824932.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" 66824932.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection 66824932.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" 66824932.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableIOAVProtection = "1" 66824932.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" 66824932.exe -
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
Executes dropped EXE 3 IoCs
pid Process 4460 un924195.exe 4116 66824932.exe 2164 rk810407.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features 66824932.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" 66824932.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce d3b3437d6ea7a02c992585b5cf2b2c34fb7c4b93b81e4407ae7d7d3ee5def890.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d3b3437d6ea7a02c992585b5cf2b2c34fb7c4b93b81e4407ae7d7d3ee5def890.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce un924195.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" un924195.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3088 4116 WerFault.exe 82 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4116 66824932.exe 4116 66824932.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4116 66824932.exe Token: SeDebugPrivilege 2164 rk810407.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2600 wrote to memory of 4460 2600 d3b3437d6ea7a02c992585b5cf2b2c34fb7c4b93b81e4407ae7d7d3ee5def890.exe 81 PID 2600 wrote to memory of 4460 2600 d3b3437d6ea7a02c992585b5cf2b2c34fb7c4b93b81e4407ae7d7d3ee5def890.exe 81 PID 2600 wrote to memory of 4460 2600 d3b3437d6ea7a02c992585b5cf2b2c34fb7c4b93b81e4407ae7d7d3ee5def890.exe 81 PID 4460 wrote to memory of 4116 4460 un924195.exe 82 PID 4460 wrote to memory of 4116 4460 un924195.exe 82 PID 4460 wrote to memory of 4116 4460 un924195.exe 82 PID 4460 wrote to memory of 2164 4460 un924195.exe 86 PID 4460 wrote to memory of 2164 4460 un924195.exe 86 PID 4460 wrote to memory of 2164 4460 un924195.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3b3437d6ea7a02c992585b5cf2b2c34fb7c4b93b81e4407ae7d7d3ee5def890.exe"C:\Users\Admin\AppData\Local\Temp\d3b3437d6ea7a02c992585b5cf2b2c34fb7c4b93b81e4407ae7d7d3ee5def890.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un924195.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\un924195.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\66824932.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\66824932.exe3⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4116 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4116 -s 10924⤵
- Program crash
PID:3088
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk810407.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\rk810407.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2164
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4116 -ip 41161⤵PID:2072
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
536KB
MD52ad672d5abbebef235a4972809593839
SHA1c655da2f1fd47c1a5b604536fbc59cd878f343f5
SHA25612a282aa9dcca2ee23d956e73455e7a4f4608184286f108fadb2d63ebd2edd86
SHA5120741dd229369b9b6120f04e58e3b11a54faea91857ccc1c43bf051b22297b8783ffd25f435e4272922c4c3c82ce800da5577c2fe1552ac46974588f8cacb0c8f
-
Filesize
536KB
MD52ad672d5abbebef235a4972809593839
SHA1c655da2f1fd47c1a5b604536fbc59cd878f343f5
SHA25612a282aa9dcca2ee23d956e73455e7a4f4608184286f108fadb2d63ebd2edd86
SHA5120741dd229369b9b6120f04e58e3b11a54faea91857ccc1c43bf051b22297b8783ffd25f435e4272922c4c3c82ce800da5577c2fe1552ac46974588f8cacb0c8f
-
Filesize
259KB
MD5a72b294115d9456f54c5cbc18387d1dd
SHA16b6c2578b326321591f4b629a43ba1178c5d1453
SHA256514293c4815fab741a85209b5d1210deb252d05d9eded2c76021c4870730f773
SHA5128b49e50a9877f411e0aaa2e41456a58cd1aec4bf60ab0cd973567d33612b4b6d3e650bdea69284a54a8fa556aa4b13a78e0aef91b96091f0c2d1a667bfc29dad
-
Filesize
259KB
MD5a72b294115d9456f54c5cbc18387d1dd
SHA16b6c2578b326321591f4b629a43ba1178c5d1453
SHA256514293c4815fab741a85209b5d1210deb252d05d9eded2c76021c4870730f773
SHA5128b49e50a9877f411e0aaa2e41456a58cd1aec4bf60ab0cd973567d33612b4b6d3e650bdea69284a54a8fa556aa4b13a78e0aef91b96091f0c2d1a667bfc29dad
-
Filesize
341KB
MD5ff7d8e449dfe37d4a83b77708dbb714e
SHA13fdceec5f99e42ff0c5fec12ee497cbf215527dc
SHA2569f8167c60e0d4899ef4d3ec9aa855d2181523c4546f3f7140461b8c798b5c5c8
SHA512479d6244e99b00acb27826bfb6c6215d070fd899c66b36a51b875be0d00bfd44c07f75ec1fa883cf960bd21cd45715463ded8a564ee2dba22cafaec5b1510a19
-
Filesize
341KB
MD5ff7d8e449dfe37d4a83b77708dbb714e
SHA13fdceec5f99e42ff0c5fec12ee497cbf215527dc
SHA2569f8167c60e0d4899ef4d3ec9aa855d2181523c4546f3f7140461b8c798b5c5c8
SHA512479d6244e99b00acb27826bfb6c6215d070fd899c66b36a51b875be0d00bfd44c07f75ec1fa883cf960bd21cd45715463ded8a564ee2dba22cafaec5b1510a19